News

Blocker Tool Provided for Windows Server 2003 SP1

Microsoft on Tuesday posted a blocker tool to help organizations prevent Automatic Updates from automatically downloading and installing Windows Server 2003 Service Pack 1 on their systems.

Windows Server 2003 SP1 was posted to the Web in March and will be automatically distributed through Automatic Updates at the end of July.

"For those enterprise customers that require additional time to prepare for the download and deployment of SP1, Microsoft will provide a 'Blocker' tool kit," a Microsoft spokesperson said in an e-mail to reporters. The tool will block the download of SP1 while allowing Automatic Updates to download all other security updates.

The blocker tool is available at http://www.microsoft.com/downloads/details.aspx? familyid=FC145B0B-C148 -445A-82BA-9B2F3AEF6E60&displaylang=en.

The tool will be effective until March 30, 2006 -- one full year after the release to manufacturing of Windows Server 2003 SP1.

Microsoft made a similar tool available for Windows XP Service Pack 2, on which Windows Server 2003 SP1 is based. The server-side tool is likely to be much less in demand, as fewer organizations allow Microsoft's bare-bones Automatic Updates infrastructure to handle their server patching process than their client patching process.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • The 2021 Microsoft Product Roadmap

    From Windows 10X to the next generation of Microsoft's application server products, here are the product milestones coming down the pipeline in 2021.

  • After High-Profile Attacks, Biden Calls for Better Software Security

    Recent high-profile security attacks have prompted the Biden administration to issue an executive order aiming to tighten software security practices across the board.

  • With Hybrid Networks on Rise, Microsoft Touts Zero Trust Security

    Hybrid networks, which combine use of cloud services with on-premises software, require a "zero trust" security approach, Microsoft said this week.

  • Feds Advise Orgs on How To Block Ransomware Amid Colonial Pipeline Attack

    A recent ransomware attack on a U.S. fuel pipeline company has put a spotlight on how "critical infrastructure" organizations can prevent similar attacks.